OBJECTIVE 5.4 Summarize

Summarize elements of effective security compliance

Compliance is meeting the requirements imposed by laws, regulations, industry standards, and contractual obligations. It’s not optional, and penalties for non-compliance can be severe — fines, lawsuits, loss of business, or criminal liability.

Regulatory Frameworks

GDPR (General Data Protection Regulation)

EU regulation governing personal data of EU residents.

  • Applies to any organization processing EU resident data, regardless of where the org is located
  • Key requirements: Lawful basis for processing, data subject rights (access, deletion, portability), 72-hour breach notification, Data Protection Officer (DPOData Protection Officer — Required by GDPR for certain organizations) for certain orgs, privacy by design
  • Penalties: Up to 4% of annual global revenue or €20 million, whichever is greater

HIPAA (Health Insurance Portability and Accountability Act)

US regulation protecting healthcare data (PHIProtected Health Information — Health-related PII under HIPAA — Protected Health Information).

  • Applies to covered entities (healthcare providers, insurers) and their business associates
  • Security Rule: Technical, physical, and administrative safeguards for ePHI
  • Privacy Rule: How PHIProtected Health Information — Health-related PII under HIPAA can be used and disclosed
  • Breach Notification Rule: Notification requirements when PHIProtected Health Information — Health-related PII under HIPAA is compromised

PCI-DSS (Payment Card Industry Data Security Standard)

Industry standard for organizations that handle credit card data.

  • Not a law — contractual requirement from card brands (Visa, Mastercard, etc.)
  • 12 requirements covering network security, data protection, access control, monitoring, testing
  • Quarterly vulnerability scans by Approved Scanning Vendor (ASVApproved Scanning Vendor — PCI-DSS authorized external vulnerability scanner)
  • Annual assessment (Self-Assessment Questionnaire for small merchants, on-site audit for large)

SOX (Sarbanes-Oxley Act)

US law requiring internal controls over financial reporting for publicly traded companies.

  • ITInformation Technology — Broad term for computing infrastructure and services controls are in scope because financial data flows through ITInformation Technology — Broad term for computing infrastructure and services systems
  • Section 404: Management must assess and report on internal control effectiveness

GLBA (Gramm-Leach-Bliley Act)

US law requiring financial institutions to protect customer financial information.

  • Safeguards Rule: Risk assessment, employee training, vendor oversight

FERPA (Family Educational Rights and Privacy Act)

US law protecting student education records.

CCPA/CPRA (California Consumer Privacy Act / California Privacy Rights Act)

California privacy regulation — often called “US GDPRGeneral Data Protection Regulation — EU data privacy regulation.”

  • Consumer rights: know what data is collected, delete data, opt out of sale
  • Applies to businesses meeting revenue/data thresholds

Key Compliance Distinctions

Due Diligence vs. Due Care

CompTIA tests this explicitly. Know the difference cold.

  • Due diligence: The investigation and research before making a decision. Identifying risks, evaluating controls, understanding regulatory requirements. “Did you do your homework?”
  • Due care: The ongoing implementation and maintenance of reasonable protections after you know the risks. “Are you doing what a reasonable person would do?”
ConceptWhenExample
Due diligenceBefore/during planningConducting a risk assessment before adopting a cloud provider
Due careOngoing operationsApplying patches promptly after they’re released

Failure of due diligence = negligence in preparation. Failure of due care = negligence in execution. Both create legal liability.

Attestation vs. Acknowledgement

  • Attestation: A formal declaration that something is true, typically by a qualified third party. An auditor attests that controls are operating effectively. A SOC 2 report is an attestation.
  • Acknowledgement: Confirmation that a person has received and understood information. An employee acknowledging the AUPAcceptable Use Policy — Policy defining permitted use of org resources isn’t attesting to its accuracy — they’re confirming they read it.

Data Roles

RoleResponsibilityExample
Data OwnerBusiness executive who decides classification and access policyVP of Finance owns financial data
Data StewardEnsures data quality, integrity, and proper use within policyDatabase admin who enforces naming conventions, validates data accuracy
Data CustodianImplements technical controls the owner definesSysadmin who configures encryption and backups
Data ControllerDetermines purposes and means of processing (GDPRGeneral Data Protection Regulation — EU data privacy regulation term)The company collecting customer data
Data ProcessorProcesses data on behalf of the controllerA cloud provider storing that data

Exam trap: Data steward ≠ data custodian. The steward focuses on data quality and governance within business rules. The custodian focuses on technical implementation of protections.

Breach Notification Requirements

Notification timelines vary by regulation. CompTIA expects you to know the key ones:

RegulationNotification DeadlineWho Must Be Notified
GDPRGeneral Data Protection Regulation — EU data privacy regulation72 hours to supervisory authorityAuthority + affected individuals if high risk
HIPAAHealth Insurance Portability and Accountability Act — US healthcare data protection law60 days to HHS + individualsHHS, affected individuals, media if >500 people
PCI-DSSPayment Card Industry Data Security Standard — Credit card data protection standardASAP (no fixed timeline)Card brands, acquiring bank
State breach lawsVaries (30–90 days typical)State AG, affected residents
  • Clock starts when the breach is discovered, not when it occurred
  • “Discovery” means when the org knew or should have known — willful ignorance doesn’t stop the clock
  • Notification must include: what happened, what data was involved, what the org is doing about it, what affected individuals should do

Data Retention and Classification

Retention Periods by Regulation

RegulationRetention PeriodWhat’s Retained
PCI-DSSPayment Card Industry Data Security Standard — Credit card data protection standard1 year (audit logs)Cardholder data environment logs
SOXSarbanes-Oxley Act — US financial reporting controls law7 yearsFinancial records, audit workpapers
HIPAAHealth Insurance Portability and Accountability Act — US healthcare data protection law6 yearsPHIProtected Health Information — Health-related PII under HIPAA-related documentation, policies
GDPRGeneral Data Protection Regulation — EU data privacy regulationNo longer than necessaryPersonal data (purpose limitation)
IRS7 yearsTax-related financial records
  • Retention policies must address both minimum (hold at least this long) and maximum (delete after this long) periods
  • GDPR’s “storage limitation” principle means you can’t keep data indefinitely “just in case”
  • Retention applies to backups too — a backup containing data past its retention period is a compliance violation

Data Inventory and Classification

Data classification is a prerequisite for compliance, not a separate activity:

  1. Inventory: Identify what data you have, where it lives, who accesses it
  2. Classify: Apply labels based on sensitivity (Public, Internal, Confidential, Restricted)
  3. Map to requirements: Which regulations apply to which data categories
  4. Apply controls: Controls proportional to classification level
  5. Monitor: Ongoing verification that classified data is handled according to policy

Without a data inventory, compliance is guesswork. You can’t protect what you don’t know you have.

Compliance Monitoring

Automated vs. Periodic Monitoring

  • Automated/continuous: Real-time compliance checking via tools (CSPMCloud Security Posture Management — Monitors cloud configurations for misconfigurations for cloud, SIEMSecurity Information and Event Management — Centralized log collection, correlation, and alerting for log retention, configuration management for baselines). Catches drift immediately.
  • Periodic: Scheduled reviews — quarterly access reviews, annual policy reviews, monthly control testing. Catches issues on a cadence.
  • Best practice is both: automated monitoring for technical controls, periodic reviews for procedural and administrative controls.

Gap Remediation Tracking

  • Gaps identified during audits or monitoring must be tracked to closure
  • Plan of Action and Milestones (POA&M): Formal document listing each gap, remediation steps, responsible party, and deadline
  • Compensating controls may be acceptable while permanent fixes are implemented
  • Regulators and auditors want to see progress, not perfection — but they want to see documented progress

Master Regulatory Comparison

One table to rule them all. CompTIA loves “which regulation applies?” questions.

RegulationApplies ToProtectsKey RequirementsPenaltiesRetentionBreach Notification
GDPRGeneral Data Protection Regulation — EU data privacy regulationAny org processing EU resident dataPersonal data of EU residentsLawful basis, DPOData Protection Officer — Required by GDPR for certain organizations, privacy by design, data subject rightsUp to 4% global revenue or €20MNo longer than necessary72 hours to authority
HIPAAHealth Insurance Portability and Accountability Act — US healthcare data protection lawHealthcare providers, insurers, business associatesPHIProtected Health Information — Health-related PII under HIPAA (Protected Health Information)Technical/admin/physical safeguards, BAAs, minimum necessaryUp to $1.5M per violation category/year6 years (documentation)60 days to HHS + individuals
PCI-DSSPayment Card Industry Data Security Standard — Credit card data protection standardAny org handling payment card dataCardholder data12 requirements, quarterly ASVApproved Scanning Vendor — PCI-DSS authorized external vulnerability scanner scans, annual assessmentContract penalties, increased fees, loss of card processing1 year (audit logs)ASAP to card brands + acquirer
SOXSarbanes-Oxley Act — US financial reporting controls lawUS publicly traded companiesFinancial reporting integritySection 404 internal controls, audit trailsFines, prison (up to 20 years for willful violation)7 yearsN/A (SEC filings)
GLBAGramm-Leach-Bliley Act — US financial data protection lawUS financial institutionsCustomer financial informationSafeguards Rule, privacy notices, vendor oversightFines per violationVariesState-specific
FERPAFamily Educational Rights and Privacy Act — US student data privacy lawEducational institutions receiving federal fundingStudent education recordsConsent for disclosure, access rights, amendment rightsLoss of federal fundingVaries by record typeNo federal requirement
CCPACalifornia Consumer Privacy Act — California data privacy regulation/CPRABusinesses meeting CACertificate Authority — Entity that issues and signs digital certificates revenue/data thresholdsCACertificate Authority — Entity that issues and signs digital certificates consumer personal informationRight to know, delete, opt-out of sale, correct$2,500/violation, $7,500/intentionalReasonable periodNo specific timeline
SOC 2Service organizations (voluntary)Customer data (Trust Services Criteria)Security, availability, processing integrity, confidentiality, privacyN/A (market consequence)Per engagementPer contract

Exam decision logic:

  • Healthcare data → HIPAAHealth Insurance Portability and Accountability Act — US healthcare data protection law
  • EU personal data → GDPRGeneral Data Protection Regulation — EU data privacy regulation
  • Credit card numbers → PCI-DSSPayment Card Industry Data Security Standard — Credit card data protection standard
  • Student records → FERPAFamily Educational Rights and Privacy Act — US student data privacy law
  • Financial reporting → SOXSarbanes-Oxley Act — US financial reporting controls law
  • California residents → CCPACalifornia Consumer Privacy Act — California data privacy regulation/CPRA
  • Customer financial data → GLBAGramm-Leach-Bliley Act — US financial data protection law
  • “Which has the shortest breach notification?” → GDPRGeneral Data Protection Regulation — EU data privacy regulation (72 hours)
  • “Which has the highest penalties?” → GDPRGeneral Data Protection Regulation — EU data privacy regulation (percentage of global revenue)

Compliance vs. Security

Compliance ≠ Security. An organization can be compliant and insecure, or secure and non-compliant.

  • Compliance is the minimum baseline — the floor, not the ceiling
  • Compliance frameworks can lag behind current threats
  • Checkbox compliance without genuine security investment creates a false sense of safety
  • However, compliance drives accountability and funding that might not otherwise exist

Compliance Elements

Policies and Procedures

Documented controls that demonstrate how requirements are met.

  • Must be current, approved, and distributed to relevant personnel

Evidence Collection

Proof that controls are implemented and operating effectively.

  • Logs, configurations, screenshots, tickets, training records
  • Must be maintained for the retention period required by the standard

Internal Monitoring

Continuous or periodic self-assessment to verify compliance is maintained.

  • Automated compliance monitoring tools
  • Regular control testing and validation
  • Gap remediation tracking

Reporting

Demonstrating compliance to regulators, auditors, or business partners.

  • Compliance reports, attestation letters, certification documents
  • Incident reporting within required timeframes (GDPRGeneral Data Protection Regulation — EU data privacy regulation 72-hour requirement)

Data Privacy

Key Concepts

  • PIIPersonally Identifiable Information — Data that can identify an individual (Personally Identifiable Information): Data that can identify an individual (name, SSN, email, IPInternet Protocol — Network layer addressing and routing address in some jurisdictions)
  • PHIProtected Health Information — Health-related PII under HIPAA (Protected Health Information): Health-related PIIPersonally Identifiable Information — Data that can identify an individual under HIPAAHealth Insurance Portability and Accountability Act — US healthcare data protection law
  • Data sovereignty: Legal requirement that data is subject to the laws of the country where it’s stored
  • Data localization: Requirement that data must be stored within specific geographic boundaries
  • Privacy Impact Assessment (PIAPrivacy Impact Assessment — Evaluation of how a system affects privacy): Evaluation of how a project or system affects individual privacy

Data Subject Rights (GDPR model)

  • Right of access: See what data is held about you
  • Right to rectification: Correct inaccurate data
  • Right to erasure (“right to be forgotten”): Request deletion of personal data
  • Right to portability: Receive your data in a portable format
  • Right to object: Opt out of certain data processing
  • Must be freely given, specific, informed, and unambiguous
  • Pre-checked boxes are not valid consent under GDPRGeneral Data Protection Regulation — EU data privacy regulation
  • Must be as easy to withdraw as to give

Consequences of Non-Compliance

  • Financial: Fines (GDPRGeneral Data Protection Regulation — EU data privacy regulation fines regularly in millions), contract penalties
  • Legal: Lawsuits, regulatory action, criminal charges for willful negligence
  • Reputational: Loss of customer trust, public disclosure of failures
  • Operational: Loss of ability to process payments (PCI-DSSPayment Card Industry Data Security Standard — Credit card data protection standard), loss of government contracts

Offensive Context

Compliance frameworks exist because organizations historically failed to implement basic security without external pressure. From the offensive side, compliance documentation is reconnaissance gold — it tells the attacker what controls are supposedly in place. The gap between documented compliance and actual implementation is where attackers find opportunity. “We’re PCI compliant” means nothing if the controls are poorly implemented or scope is minimized to pass the audit rather than genuinely protect cardholder data.